Author of the publication

Android Malware Identification Through Visual Exploration of Disambly Files.

, and . Int. J. Netw. Secur., 20 (6): 1061-1073 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Multifunctional Lentiviral-Based Gene Knockdown with Concurrent Rescue that Controls for Off-Target Effects of RNAi., , , , , , and . Genom. Proteom. Bioinform., 8 (4): 238-245 (2010)Precision Methylome and In Vivo Methylation Kinetics Characterization of Klebsiella pneumoniae., , , , , , , , , and 5 other author(s). Genom. Proteom. Bioinform., 20 (2): 418-434 (2022)Dynamic DNA 5-hydroxylmethylcytosine and RNA 5-methycytosine Reprogramming During Early Human Development., , , , , , , , , and 3 other author(s). Genom. Proteom. Bioinform., 21 (4): 805-822 (August 2023)Impacts of winter heating on the population mobility of northern China's prefectural cities: evidence from a regression discontinuity design., , , and . Kybernetes, 51 (4): 1601-1625 (2022)Design and Implementation of DDoS Attack and Defense Simulation Subsystem Based on Mininet., , , and . ICCT, page 1328-1334. IEEE, (2022)Regulation of U6 Promoter Activity by Transcriptional Interference in Viral Vector-Based RNAi., , , , , and . Genom. Proteom. Bioinform., 8 (3): 170-179 (2010)Epitranscriptomic 5-Methylcytosine Profile in PM2.5-induced Mouse Pulmonary Fibrosis., , , , , , , , , and 2 other author(s). Genom. Proteom. Bioinform., 18 (1): 41-51 (2020)Fiber-Optic Magnetic Field Sensing Based on Microfiber Knot Resonator with Magnetic Fluid Cladding., , , and . Sensors, 18 (12): 4358 (2018)An RNA-seq-based Gene Expression Profiling of Radiation-induced Tumorigenic Mammary Epithelial Cells., , , , , , , , , and 2 other author(s). Genom. Proteom. Bioinform., 10 (6): 326-335 (2012)Android Malware Identification Through Visual Exploration of Disambly Files., and . Int. J. Netw. Secur., 20 (6): 1061-1073 (2018)